72,732 research outputs found

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content

    Intrastate Crowdfunding in Alaska: Is There Security in Following the Crowd?

    Get PDF
    This Note analyzes the potential of crowdfunding for the State of Alaska. Crowdfunding can open up new sources of revenue for small businesses while simultaneously providing an avenue for Alaskans to invest in their own communities. The potential, however, must be weighed against the risk of fraud, poorly run businesses, and the lack of protection for investors. It is the responsibility of the Alaska legislature, the State’s securities administrators, and the Securities and Exchange Commission to ensure that investors are adequately protected. This Note discusses Alaska’s crowdfunding legislation, the Alaska Intrastate Crowdfunding Exemption, and recommends changes to the legislation that account for the risks involved in crowdfunding while still capturing its potential

    Can Google searches help nowcast and forecast unemployment rates in the Visegrad Group countries?

    Get PDF
    Online activity of the Internet users has been repeatedly shown to provide a rich information set for various research fields. We focus on the job-related searches on Google and their possible usefulness in the region of the Visegrad Group -- the Czech Republic, Hungary, Poland and Slovakia. Even for rather small economies, the online searches of their inhabitants can be successfully utilized for macroeconomic predictions. Specifically, we study the unemployment rates and their interconnection to the job-related searches. We show that the Google searches strongly enhance both nowcasting and forecasting models of the unemployment rates.Comment: 22 pages, 2 figures, 3 table

    A Wolf in Sheep���s Clothing? An analysis of student engagement with virtual learning environments.

    Get PDF
    The article is freely available on-line via The Higher Education Academy website.The growth in the use of virtual learning environments to support learning and teaching should be accompanied by research to examine their effectiveness. The aim of this study was twofold: a) To explore the views, opinions and experiences of student engagement or non-engagement in online learning activities; b) To use this knowledge to develop learning and teaching strategies that enhance student engagement with online learning activities. Focus groups were conducted with students studying leisure and tourism degree programmes to explore reasons for usage and non-usage of the online activities in the Wolverhampton Online Learning Framework (WOLF). Results identified issues related to student awareness, motivation, behaviour and learning approaches, assessment and technical factors. Findings from the study have implications for practice, including how to enhance the relevance of information, technical factors, enhancing awareness and links with assessment

    OMS FDIR: Initial prototyping

    Get PDF
    The Space Station Freedom Program (SSFP) Operations Management System (OMS) will automate major management functions which coordinate the operations of onboard systems, elements and payloads. The objectives of OMS are to improve safety, reliability and productivity while reducing maintenance and operations cost. This will be accomplished by using advanced automation techniques to automate much of the activity currently performed by the flight crew and ground personnel. OMS requirements have been organized into five task groups: (1) Planning, Execution and Replanning; (2) Data Gathering, Preprocessing and Storage; (3) Testing and Training; (4) Resource Management; and (5) Caution and Warning and Fault Management for onboard subsystems. The scope of this prototyping effort falls within the Fault Management requirements group. The prototyping will be performed in two phases. Phase 1 is the development of an onboard communications network fault detection, isolation, and reconfiguration (FDIR) system. Phase 2 will incorporate global FDIR for onboard systems. Research into the applicability of expert systems, object-oriented programming, fuzzy sets, neural networks and other advanced techniques will be conducted. The goals and technical approach for this new SSFP research project are discussed here

    Disloyal Computer Use and the Computer Fraud and Abuse Act: Narrowing the Scope

    Get PDF
    Congress drafted the Computer Fraud and Abuse Act (CFAA) to protect government interest computers from malicious attacks by hackers. As computer use has expanded in the years since its enactment, the CFAA has similarly expanded to cover a number of computer-related activities. This iBrief discusses the extension of the CFAA into the employer/employee context, suggests that this goes beyond the Act\u27s express purpose, compares the different approaches taken by the circuit courts in applying the CFAA to disloyal computer use by employees, and argues that the more recent approach taken by the Ninth Circuit provides a better model for determining if and when the CFAA should apply to employees

    Metodologia badań politologicznych na przykładzie eurazjatyzmu

    Get PDF
    The text answers the following question: what is the point of conducting political science research? The research can make a lot of sense when you are strongly motivated and, motivation is just as important as your knowledge how to do it. In the latter case, you must proceed in the correct order. Firstly, the boundaries of the research field should be set, and secondly, original and unconventional research problems and hypotheses should be defined. Thirdly, the proper selection of primary and secondary sources is necessary. Fourthly, you choose appropriate research methods and techniques, and then construct a research tool or tools. After the determining of the level of accuracy and relevance of data collected, it is possible to proceed to the verification of hypotheses. The more thorough the process and the more inquisitive researcher, the more interesting research results are obtained.Tekst odpowiada na pytanie: jaki jest sens prowadzenia badań politologicznych? Wtedy, gdy ma się odpowiednią motywację i (co równie ważne) wie się, jak to można zrobić. W tym drugim przypadku musi się postępować w odpowiedniej kolejności. Po pierwsze, należy wyznaczyć granice pola badawczego, a po drugie, określić oryginalne, niebanalne problemy i hipotezy badawcze. Po trzecie, konieczny jest odpowiedni dobór i sposób selekcji źródeł pierwotnych i ewentualnie wtórnych. Czwartym etapem jest dobranie adekwatnych metod i technik badawczych, a następnie skonstruowanie narzędzia lub narzędzi badawczych. Po określeniu poziomu prawdziwości i stosowalności zebranych informacji możliwe jest dopiero przystąpienie do weryfikacji hipotez. Im bardziej ten ostatni proces będzie rzetelny, a badacz dociekliwy, tym ciekawsze uzyska się rezultaty badawcze
    • …
    corecore